
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-53677 is a critical file upload vulnerability in Apache Struts that was discovered and disclosed on December 11, 2024. The vulnerability affects Apache Struts versions from 2.0.0 through 6.3.0.2. This flaw allows attackers to manipulate file upload parameters to enable path traversal, potentially leading to Remote Code Execution (RCE). The vulnerability received a Critical CVSS score of 9.5 (NVD, Arctic Wolf).
The vulnerability is a path traversal flaw in the Struts2 file upload mechanism that allows attackers to upload files to restricted directories. The issue specifically affects the old File Upload Interceptor component. The vulnerability builds upon similar flaws identified in previous vulnerabilities, suggesting incomplete patches may have contributed to its emergence. The critical severity is reflected in its CVSS 4.0 score of 9.5, with the vector string CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red (Sonatype).
The vulnerability's exploitation can lead to severe consequences including Remote Code Execution if a webshell is uploaded and exposed in the web root. The impact is particularly concerning due to three factors: the vulnerability's automation potential, widespread adoption of Struts2 in enterprise environments, and the timing of discovery during the holiday season when organizations typically operate with reduced staffing (Sonatype).
Organizations are strongly recommended to upgrade to Apache Struts version 6.4.0 or later and migrate to the new Action File Upload mechanism. This update is not backward-compatible and requires code modifications to implement the new file upload interceptor. Applications continuing to use the old File Upload mechanism will remain vulnerable. Organizations should also maintain an up-to-date software bill of materials (SBOM) to identify dependencies on Struts2, use software composition analysis (SCA) tools to identify affected components, and monitor exploitation trends (Apache, Sonatype).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."